summaryrefslogtreecommitdiffstats
path: root/Bugzilla/MFA/TOTP.pm
diff options
context:
space:
mode:
authorPerl Tidy <perltidy@bugzilla.org>2018-12-05 21:38:52 +0100
committerDylan William Hardison <dylan@hardison.net>2018-12-05 23:49:08 +0100
commit8ec8da0491ad89604700b3e29a227966f6d84ba1 (patch)
tree9d270f173330ca19700e0ba9f2ee931300646de1 /Bugzilla/MFA/TOTP.pm
parenta7bb5a65b71644d9efce5fed783ed545b9336548 (diff)
downloadbugzilla-8ec8da0491ad89604700b3e29a227966f6d84ba1.tar.gz
bugzilla-8ec8da0491ad89604700b3e29a227966f6d84ba1.tar.xz
no bug - reformat all the code using the new perltidy rules
Diffstat (limited to 'Bugzilla/MFA/TOTP.pm')
-rw-r--r--Bugzilla/MFA/TOTP.pm75
1 files changed, 38 insertions, 37 deletions
diff --git a/Bugzilla/MFA/TOTP.pm b/Bugzilla/MFA/TOTP.pm
index 131dea676..2398fcbeb 100644
--- a/Bugzilla/MFA/TOTP.pm
+++ b/Bugzilla/MFA/TOTP.pm
@@ -21,60 +21,61 @@ use GD::Barcode::QRcode;
use MIME::Base64 qw( encode_base64 );
sub can_verify_inline {
- return 1;
+ return 1;
}
sub _auth {
- my ($self) = @_;
- return Auth::GoogleAuth->new({
- secret => $self->property_get('secret') // $self->property_get('secret.temp'),
- issuer => template_var('terms')->{BugzillaTitle},
- key_id => $self->{user}->login,
- });
+ my ($self) = @_;
+ return Auth::GoogleAuth->new({
+ secret => $self->property_get('secret') // $self->property_get('secret.temp'),
+ issuer => template_var('terms')->{BugzillaTitle},
+ key_id => $self->{user}->login,
+ });
}
sub enroll_api {
- my ($self) = @_;
-
- # create a new secret for the user
- # store it in secret.temp to avoid overwriting a valid secret
- $self->property_set('secret.temp', generate_random_password(16));
-
- # build the qr code
- my $auth = $self->_auth();
- my $otpauth = $auth->qr_code(undef, undef, undef, 1);
- my $png = GD::Barcode::QRcode->new($otpauth, { Version => 10, ModuleSize => 3 })->plot()->png();
- return { png => encode_base64($png), secret32 => $auth->secret32 };
+ my ($self) = @_;
+
+ # create a new secret for the user
+ # store it in secret.temp to avoid overwriting a valid secret
+ $self->property_set('secret.temp', generate_random_password(16));
+
+ # build the qr code
+ my $auth = $self->_auth();
+ my $otpauth = $auth->qr_code(undef, undef, undef, 1);
+ my $png = GD::Barcode::QRcode->new($otpauth, {Version => 10, ModuleSize => 3})
+ ->plot()->png();
+ return {png => encode_base64($png), secret32 => $auth->secret32};
}
sub enrolled {
- my ($self) = @_;
+ my ($self) = @_;
- # make the temporary secret permanent
- $self->property_set('secret', $self->property_get('secret.temp'));
- $self->property_delete('secret.temp');
+ # make the temporary secret permanent
+ $self->property_set('secret', $self->property_get('secret.temp'));
+ $self->property_delete('secret.temp');
}
sub prompt {
- my ($self, $vars) = @_;
- my $template = Bugzilla->template;
+ my ($self, $vars) = @_;
+ my $template = Bugzilla->template;
- print Bugzilla->cgi->header();
- $template->process('mfa/totp/verify.html.tmpl', $vars)
- || ThrowTemplateError($template->error());
+ print Bugzilla->cgi->header();
+ $template->process('mfa/totp/verify.html.tmpl', $vars)
+ || ThrowTemplateError($template->error());
}
sub check {
- my ($self, $params) = @_;
- my $code = $params->{code};
- return if $self->_auth()->verify($code, 1);
-
- if ($params->{mfa_action} && $params->{mfa_action} eq 'enable') {
- ThrowUserError('mfa_totp_bad_enrollment_code');
- }
- else {
- ThrowUserError('mfa_bad_code');
- }
+ my ($self, $params) = @_;
+ my $code = $params->{code};
+ return if $self->_auth()->verify($code, 1);
+
+ if ($params->{mfa_action} && $params->{mfa_action} eq 'enable') {
+ ThrowUserError('mfa_totp_bad_enrollment_code');
+ }
+ else {
+ ThrowUserError('mfa_bad_code');
+ }
}
1;